Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /28 /30 /27 /29 /28 /30 /27 /29 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following TCP/IP protocol allows an application program on one machine to send a datagram to an application program on another machine? X.25 VMTP SMTP UDP None of these X.25 VMTP SMTP UDP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which transmission mode is used for data communication along telephone lines? None of these Parallel Serial Synchronous Asynchronous None of these Parallel Serial Synchronous Asynchronous ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to transmit characters one at a time rearrange the connections between computing equipment echo every character that is received None of these control how messages are passed between computers transmit characters one at a time rearrange the connections between computing equipment echo every character that is received None of these control how messages are passed between computers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. MAU transceiver nine-pin connector NIC None of these MAU transceiver nine-pin connector NIC None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How often are BPDUs sent from a layer 2 device? Every 2 seconds Never Every 10 minutes Every 30 seconds Every 2 seconds Never Every 10 minutes Every 30 seconds ANSWER DOWNLOAD EXAMIANS APP